Top-Rated Free Essay
Preview

iss project0

Satisfactory Essays
376 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
iss project0
BCIS 6370 26 ­ Information Systems Security Hanish Mandru
ID NO:360684

1. Do you think this event was caused by an insider or outsider? Why do you think this?
A.An insider could have been included, tragically, but unintentionally, by joining an individual usb streak removable commute to the workplace machine to the manager, was contaminated somewhere else with an infection or worm. Be that as it may, all the more than likely the guilty party was a pariah in light of the fact that it was expressed in account that the issues started when the clients clicked their email connections. Also most messages regularly originate from the outside. 2. Other than installing virus and worm control software, what can SLS do to prepare for the next incident? A.They thought to introduce an industry­standard firewall into their frameworks. Really they should have had one effectively, overall this issue would not have happened. Be that as it may I guess they don't have a strong security arrangement set up. Likewise, the way that they were putting in new infection programming lets me know that they either had a shabby one introduced before or that they never had one in any case. 3. Do you think this attack was the result of a virus or a worm? Why do you think this?
A.It would need to be both. An infection can demolish your machine framework and a worm is used to spread it. The way that Amy got a pack of contaminated messages all the while tells me that this is a pulverizing worm that engenders an infection and spreads it quickly through thee­sends by means of their connections. 1.Would it be ethical for Amy to open such a file?
A.No,it is not ethical for Amy to open because the attacker can hack email and may misuse the information. 2.If such an email came in, what would be the best action to take?
A.It is good to avoid and block such e­mails.User must also let other people know about such e­mails. 3. Using the Web, identify the chief information officer (CIO), chief information security officer
(CISCO), and system administrator for your school. Which of these people represent the data owner? Which represent the data custodian?
A.

You May Also Find These Documents Helpful